• T
    xfrm: Fix inbound traffic via XFRM interfaces across network namespaces · 6ac400b7
    Tobias Brunner 提交于
    [ Upstream commit 660899ddf06ae8bb5bbbd0a19418b739375430c5 ]
    
    After moving an XFRM interface to another namespace it stays associated
    with the original namespace (net in `struct xfrm_if` and the list keyed
    with `xfrmi_net_id`), allowing processes in the new namespace to use
    SAs/policies that were created in the original namespace.  For instance,
    this allows a keying daemon in one namespace to establish IPsec SAs for
    other namespaces without processes there having access to the keys or IKE
    credentials.
    
    This worked fine for outbound traffic, however, for inbound traffic the
    lookup for the interfaces and the policies used the incorrect namespace
    (the one the XFRM interface was moved to).
    
    Fixes: f203b76d ("xfrm: Add virtual xfrm interfaces")
    Signed-off-by: NTobias Brunner <tobias@strongswan.org>
    Signed-off-by: NSteffen Klassert <steffen.klassert@secunet.com>
    Signed-off-by: NSasha Levin <sashal@kernel.org>
    6ac400b7
xfrm_policy.c 77.3 KB